Comparison of Operating System Security - Windows Vs Linux: Techno International New Town
Comparison of Operating System Security - Windows Vs Linux: Techno International New Town
WINDOWS VS LINUX
DEPARTMENT :- CSBS.
ROLL.NO :- 18731121022.
SEMESTER :- 6TH (CA # 1).
YEAR :- 3RD .
SUBJECT :- OPERATING SYSTEMS.
PAPER CODE :- PCC-CSBS 602.
Microsoft Windows and Linux are two of the most renowned operating systems
that have a widespread use in every computer-related field.
SECURITY COMPARISON OF WINDOWS VS LINUX
WINDOWS
The Windows security model is a collection of user-mode and kernel-mode processes
that deliver, monitor, and manage the different OS security components, and
coordinates among them.
It is a database that contains the local system security policy settings. This
database is stored in the registry under HKLM\SECURITY. It includes such
information as what domains are entrusted to authenticate logon attempts, who
has permission to access the system and how (interactive, network, and service
logons), who is assigned which privileges, and what kind of security auditing can
be performed.
7. Authentication Packages
They are dynamic-link libraries (DLLs) that run in the context of the Lsass process and
implement the Windows authentication policy. An authentication DLL is responsible for
checking whether a given username and password match, and if so, returning to Lsass
the information detailing the user's security identity. The Windows authentication
packages include Kerberos and MSV1_0.
8. Logon Process (Winlogon)
It is a user-mode DLL that runs in the Winlogon process and that Winlogon uses to
obtain a username and password or smart card PIN. The GINA standard library is
located at \Winnt\System32\Msgina.dll.
LINUX
The Linux security model is a collection of several active processes, daemon services,
and libraries that provide a secure framework for the Linux kernel to work in.
1. PAM Library
The Pluggable Authentication Modules (PAM) library provides the necessary interface
and functions for developing PAM-aware applications. The PAM library is essential to
allow the authentication of users in the Linux operating system.
It is a text file where the system administrator can specify which authentication
scheme is used for a particular application. On the Linux system, this configuration
information can be stored either in a file under the /etc/pam directory or as a line in
the /etc/conf configuration file. Upon the initialization of the PAM library, The PAM
configuration file is read so as to load the corresponding authentication modules .
3. Authentication Module It is a module containing several authentication
procedures, used for creating authentication credentials, authenticating users, and
HEAD – TO - HEAD
granting privileges to authenticated users.
COMPARISON
4. Account Management Module
Although both systems have their own standards
It manages user accounts and establishes whether an authenticated user is permitted to and design, they are both modularized in a way
gain access to the system. It creates login session after a successful authentication and is that their security components are sort of
responsible for validating the expiration date of the username and/or password.
independent services and processes working in
5. Password Management Module the kernel mode and in the user mode. These
processes are used by the operating system to
It handles and manages users’ passwords including setting, resetting, and changing
accomplish a specific task such as
passwords.
authentication, logging, enforcing policies, and